v1alpha1

package
v0.4.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 22, 2024 License: Apache-2.0 Imports: 9 Imported by: 0

Documentation

Overview

+kubebuilder:object:generate=true +groupName=approle.vault.upbound.io +versionName=v1alpha1

Index

Constants

View Source
const (
	CRDGroup   = "approle.vault.upbound.io"
	CRDVersion = "v1alpha1"
)

Package type metadata.

Variables

View Source
var (
	AuthBackendLogin_Kind             = "AuthBackendLogin"
	AuthBackendLogin_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: AuthBackendLogin_Kind}.String()
	AuthBackendLogin_KindAPIVersion   = AuthBackendLogin_Kind + "." + CRDGroupVersion.String()
	AuthBackendLogin_GroupVersionKind = CRDGroupVersion.WithKind(AuthBackendLogin_Kind)
)

Repository type metadata.

View Source
var (
	AuthBackendRole_Kind             = "AuthBackendRole"
	AuthBackendRole_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: AuthBackendRole_Kind}.String()
	AuthBackendRole_KindAPIVersion   = AuthBackendRole_Kind + "." + CRDGroupVersion.String()
	AuthBackendRole_GroupVersionKind = CRDGroupVersion.WithKind(AuthBackendRole_Kind)
)

Repository type metadata.

View Source
var (
	AuthBackendRoleSecretID_Kind             = "AuthBackendRoleSecretID"
	AuthBackendRoleSecretID_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: AuthBackendRoleSecretID_Kind}.String()
	AuthBackendRoleSecretID_KindAPIVersion   = AuthBackendRoleSecretID_Kind + "." + CRDGroupVersion.String()
	AuthBackendRoleSecretID_GroupVersionKind = CRDGroupVersion.WithKind(AuthBackendRoleSecretID_Kind)
)

Repository type metadata.

View Source
var (
	// CRDGroupVersion is the API Group Version used to register the objects
	CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion}

	// SchemeBuilder is used to add go types to the GroupVersionKind scheme
	SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion}

	// AddToScheme adds the types in this group-version to the given scheme.
	AddToScheme = SchemeBuilder.AddToScheme
)

Functions

This section is empty.

Types

type AuthBackendLogin

type AuthBackendLogin struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.roleId) || has(self.initProvider.roleId)",message="roleId is a required parameter"
	Spec   AuthBackendLoginSpec   `json:"spec"`
	Status AuthBackendLoginStatus `json:"status,omitempty"`
}

AuthBackendLogin is the Schema for the AuthBackendLogins API. Log into Vault using the AppRole auth backend. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*AuthBackendLogin) DeepCopy

func (in *AuthBackendLogin) DeepCopy() *AuthBackendLogin

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLogin.

func (*AuthBackendLogin) DeepCopyInto

func (in *AuthBackendLogin) DeepCopyInto(out *AuthBackendLogin)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*AuthBackendLogin) DeepCopyObject

func (in *AuthBackendLogin) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*AuthBackendLogin) GetCondition

func (mg *AuthBackendLogin) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this AuthBackendLogin.

func (*AuthBackendLogin) GetConnectionDetailsMapping

func (tr *AuthBackendLogin) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this AuthBackendLogin

func (*AuthBackendLogin) GetDeletionPolicy

func (mg *AuthBackendLogin) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this AuthBackendLogin.

func (*AuthBackendLogin) GetID

func (tr *AuthBackendLogin) GetID() string

GetID returns ID of underlying Terraform resource of this AuthBackendLogin

func (*AuthBackendLogin) GetInitParameters added in v0.2.0

func (tr *AuthBackendLogin) GetInitParameters() (map[string]any, error)

GetInitParameters of this AuthBackendLogin

func (*AuthBackendLogin) GetManagementPolicies added in v0.2.0

func (mg *AuthBackendLogin) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this AuthBackendLogin.

func (*AuthBackendLogin) GetObservation

func (tr *AuthBackendLogin) GetObservation() (map[string]any, error)

GetObservation of this AuthBackendLogin

func (*AuthBackendLogin) GetParameters

func (tr *AuthBackendLogin) GetParameters() (map[string]any, error)

GetParameters of this AuthBackendLogin

func (*AuthBackendLogin) GetProviderConfigReference

func (mg *AuthBackendLogin) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this AuthBackendLogin.

func (*AuthBackendLogin) GetProviderReference

func (mg *AuthBackendLogin) GetProviderReference() *xpv1.Reference

GetProviderReference of this AuthBackendLogin. Deprecated: Use GetProviderConfigReference.

func (*AuthBackendLogin) GetPublishConnectionDetailsTo

func (mg *AuthBackendLogin) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this AuthBackendLogin.

func (*AuthBackendLogin) GetTerraformResourceType

func (mg *AuthBackendLogin) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this AuthBackendLogin

func (*AuthBackendLogin) GetTerraformSchemaVersion

func (tr *AuthBackendLogin) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*AuthBackendLogin) GetWriteConnectionSecretToReference

func (mg *AuthBackendLogin) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this AuthBackendLogin.

func (*AuthBackendLogin) LateInitialize

func (tr *AuthBackendLogin) LateInitialize(attrs []byte) (bool, error)

LateInitialize this AuthBackendLogin using its observed tfState. returns True if there are any spec changes for the resource.

func (*AuthBackendLogin) SetConditions

func (mg *AuthBackendLogin) SetConditions(c ...xpv1.Condition)

SetConditions of this AuthBackendLogin.

func (*AuthBackendLogin) SetDeletionPolicy

func (mg *AuthBackendLogin) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this AuthBackendLogin.

func (*AuthBackendLogin) SetManagementPolicies added in v0.2.0

func (mg *AuthBackendLogin) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this AuthBackendLogin.

func (*AuthBackendLogin) SetObservation

func (tr *AuthBackendLogin) SetObservation(obs map[string]any) error

SetObservation for this AuthBackendLogin

func (*AuthBackendLogin) SetParameters

func (tr *AuthBackendLogin) SetParameters(params map[string]any) error

SetParameters for this AuthBackendLogin

func (*AuthBackendLogin) SetProviderConfigReference

func (mg *AuthBackendLogin) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this AuthBackendLogin.

func (*AuthBackendLogin) SetProviderReference

func (mg *AuthBackendLogin) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this AuthBackendLogin. Deprecated: Use SetProviderConfigReference.

func (*AuthBackendLogin) SetPublishConnectionDetailsTo

func (mg *AuthBackendLogin) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this AuthBackendLogin.

func (*AuthBackendLogin) SetWriteConnectionSecretToReference

func (mg *AuthBackendLogin) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this AuthBackendLogin.

type AuthBackendLoginInitParameters added in v0.2.0

type AuthBackendLoginInitParameters struct {

	// The unique path of the Vault backend to log in with.
	// Unique name of the auth backend to configure.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The ID of the role to log in with.
	// The RoleID to log in with.
	RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"`
}

func (*AuthBackendLoginInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginInitParameters.

func (*AuthBackendLoginInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendLoginList

type AuthBackendLoginList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []AuthBackendLogin `json:"items"`
}

AuthBackendLoginList contains a list of AuthBackendLogins

func (*AuthBackendLoginList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginList.

func (*AuthBackendLoginList) DeepCopyInto

func (in *AuthBackendLoginList) DeepCopyInto(out *AuthBackendLoginList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*AuthBackendLoginList) DeepCopyObject

func (in *AuthBackendLoginList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*AuthBackendLoginList) GetItems

func (l *AuthBackendLoginList) GetItems() []resource.Managed

GetItems of this AuthBackendLoginList.

type AuthBackendLoginObservation

type AuthBackendLoginObservation struct {

	// The accessor for the token.
	// The accessor for the token.
	Accessor *string `json:"accessor,omitempty" tf:"accessor,omitempty"`

	// The unique path of the Vault backend to log in with.
	// Unique name of the auth backend to configure.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// How long the token is valid for, in seconds.
	// How long the token is valid for.
	LeaseDuration *float64 `json:"leaseDuration,omitempty" tf:"lease_duration,omitempty"`

	// The date and time the lease started, in RFC 3339 format.
	LeaseStarted *string `json:"leaseStarted,omitempty" tf:"lease_started,omitempty"`

	// The metadata associated with the token.
	// Metadata associated with the token.
	Metadata map[string]*string `json:"metadata,omitempty" tf:"metadata,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// A list of policies applied to the token.
	// Policies set on the token.
	Policies []*string `json:"policies,omitempty" tf:"policies,omitempty"`

	// Whether the token is renewable or not.
	// Whether the token is renewable or not.
	Renewable *bool `json:"renewable,omitempty" tf:"renewable,omitempty"`

	// The ID of the role to log in with.
	// The RoleID to log in with.
	RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"`
}

func (*AuthBackendLoginObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginObservation.

func (*AuthBackendLoginObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendLoginParameters

type AuthBackendLoginParameters struct {

	// The unique path of the Vault backend to log in with.
	// Unique name of the auth backend to configure.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The ID of the role to log in with.
	// The RoleID to log in with.
	// +kubebuilder:validation:Optional
	RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"`

	// The secret ID of the role to log in with. Required
	// unless bind_secret_id is set to false on the role.
	// The SecretID to log in with.
	// +kubebuilder:validation:Optional
	SecretIDSecretRef *v1.SecretKeySelector `json:"secretIdSecretRef,omitempty" tf:"-"`
}

func (*AuthBackendLoginParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginParameters.

func (*AuthBackendLoginParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendLoginSpec

type AuthBackendLoginSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     AuthBackendLoginParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider AuthBackendLoginInitParameters `json:"initProvider,omitempty"`
}

AuthBackendLoginSpec defines the desired state of AuthBackendLogin

func (*AuthBackendLoginSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginSpec.

func (*AuthBackendLoginSpec) DeepCopyInto

func (in *AuthBackendLoginSpec) DeepCopyInto(out *AuthBackendLoginSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendLoginStatus

type AuthBackendLoginStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        AuthBackendLoginObservation `json:"atProvider,omitempty"`
}

AuthBackendLoginStatus defines the observed state of AuthBackendLogin.

func (*AuthBackendLoginStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendLoginStatus.

func (*AuthBackendLoginStatus) DeepCopyInto

func (in *AuthBackendLoginStatus) DeepCopyInto(out *AuthBackendLoginStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRole

type AuthBackendRole struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.roleName) || has(self.initProvider.roleName)",message="roleName is a required parameter"
	Spec   AuthBackendRoleSpec   `json:"spec"`
	Status AuthBackendRoleStatus `json:"status,omitempty"`
}

AuthBackendRole is the Schema for the AuthBackendRoles API. Manages AppRole auth backend roles in Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*AuthBackendRole) DeepCopy

func (in *AuthBackendRole) DeepCopy() *AuthBackendRole

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRole.

func (*AuthBackendRole) DeepCopyInto

func (in *AuthBackendRole) DeepCopyInto(out *AuthBackendRole)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*AuthBackendRole) DeepCopyObject

func (in *AuthBackendRole) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*AuthBackendRole) GetCondition

func (mg *AuthBackendRole) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this AuthBackendRole.

func (*AuthBackendRole) GetConnectionDetailsMapping

func (tr *AuthBackendRole) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this AuthBackendRole

func (*AuthBackendRole) GetDeletionPolicy

func (mg *AuthBackendRole) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this AuthBackendRole.

func (*AuthBackendRole) GetID

func (tr *AuthBackendRole) GetID() string

GetID returns ID of underlying Terraform resource of this AuthBackendRole

func (*AuthBackendRole) GetInitParameters added in v0.2.0

func (tr *AuthBackendRole) GetInitParameters() (map[string]any, error)

GetInitParameters of this AuthBackendRole

func (*AuthBackendRole) GetManagementPolicies added in v0.2.0

func (mg *AuthBackendRole) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this AuthBackendRole.

func (*AuthBackendRole) GetObservation

func (tr *AuthBackendRole) GetObservation() (map[string]any, error)

GetObservation of this AuthBackendRole

func (*AuthBackendRole) GetParameters

func (tr *AuthBackendRole) GetParameters() (map[string]any, error)

GetParameters of this AuthBackendRole

func (*AuthBackendRole) GetProviderConfigReference

func (mg *AuthBackendRole) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this AuthBackendRole.

func (*AuthBackendRole) GetProviderReference

func (mg *AuthBackendRole) GetProviderReference() *xpv1.Reference

GetProviderReference of this AuthBackendRole. Deprecated: Use GetProviderConfigReference.

func (*AuthBackendRole) GetPublishConnectionDetailsTo

func (mg *AuthBackendRole) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this AuthBackendRole.

func (*AuthBackendRole) GetTerraformResourceType

func (mg *AuthBackendRole) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this AuthBackendRole

func (*AuthBackendRole) GetTerraformSchemaVersion

func (tr *AuthBackendRole) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*AuthBackendRole) GetWriteConnectionSecretToReference

func (mg *AuthBackendRole) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this AuthBackendRole.

func (*AuthBackendRole) LateInitialize

func (tr *AuthBackendRole) LateInitialize(attrs []byte) (bool, error)

LateInitialize this AuthBackendRole using its observed tfState. returns True if there are any spec changes for the resource.

func (*AuthBackendRole) SetConditions

func (mg *AuthBackendRole) SetConditions(c ...xpv1.Condition)

SetConditions of this AuthBackendRole.

func (*AuthBackendRole) SetDeletionPolicy

func (mg *AuthBackendRole) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this AuthBackendRole.

func (*AuthBackendRole) SetManagementPolicies added in v0.2.0

func (mg *AuthBackendRole) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this AuthBackendRole.

func (*AuthBackendRole) SetObservation

func (tr *AuthBackendRole) SetObservation(obs map[string]any) error

SetObservation for this AuthBackendRole

func (*AuthBackendRole) SetParameters

func (tr *AuthBackendRole) SetParameters(params map[string]any) error

SetParameters for this AuthBackendRole

func (*AuthBackendRole) SetProviderConfigReference

func (mg *AuthBackendRole) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this AuthBackendRole.

func (*AuthBackendRole) SetProviderReference

func (mg *AuthBackendRole) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this AuthBackendRole. Deprecated: Use SetProviderConfigReference.

func (*AuthBackendRole) SetPublishConnectionDetailsTo

func (mg *AuthBackendRole) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this AuthBackendRole.

func (*AuthBackendRole) SetWriteConnectionSecretToReference

func (mg *AuthBackendRole) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this AuthBackendRole.

type AuthBackendRoleInitParameters added in v0.2.0

type AuthBackendRoleInitParameters struct {

	// The unique name of the auth backend to configure.
	// Defaults to approle.
	// Unique name of the auth backend to configure.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Whether or not to require secret_id to be
	// presented when logging in using this AppRole. Defaults to true.
	// Whether or not to require secret_id to be present when logging in using this AppRole.
	BindSecretID *bool `json:"bindSecretId,omitempty" tf:"bind_secret_id,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The RoleID of this role. If not specified, one will be
	// auto-generated.
	// The RoleID of the role. Autogenerated if not set.
	RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"`

	// The name of the role.
	// Name of the role.
	RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"`

	// If set,
	// specifies blocks of IP addresses which can perform the login operation.
	// List of CIDR blocks that can log in using the AppRole.
	SecretIDBoundCidrs []*string `json:"secretIdBoundCidrs,omitempty" tf:"secret_id_bound_cidrs,omitempty"`

	// The number of times any particular SecretID
	// can be used to fetch a token from this AppRole, after which the SecretID will
	// expire. A value of zero will allow unlimited uses.
	// Number of times which a particular SecretID can be used to fetch a token from this AppRole, after which the SecretID will expire. Leaving this unset or setting it to 0 will allow unlimited uses.
	SecretIDNumUses *float64 `json:"secretIdNumUses,omitempty" tf:"secret_id_num_uses,omitempty"`

	// The number of seconds after which any SecretID
	// expires.
	// Number of seconds a SecretID remains valid for.
	SecretIDTTL *float64 `json:"secretIdTtl,omitempty" tf:"secret_id_ttl,omitempty"`

	// List of CIDR blocks; if set, specifies blocks of IP
	// addresses which can authenticate successfully, and ties the resulting token to these blocks
	// as well.
	// Specifies the blocks of IP addresses which are allowed to use the generated token
	TokenBoundCidrs []*string `json:"tokenBoundCidrs,omitempty" tf:"token_bound_cidrs,omitempty"`

	// If set, will encode an
	// explicit max TTL
	// onto the token in number of seconds. This is a hard cap even if token_ttl and
	// token_max_ttl would otherwise allow a renewal.
	// Generated Token's Explicit Maximum TTL in seconds
	TokenExplicitMaxTTL *float64 `json:"tokenExplicitMaxTtl,omitempty" tf:"token_explicit_max_ttl,omitempty"`

	// The maximum lifetime for generated tokens in number of seconds.
	// Its current value will be referenced at renewal time.
	// The maximum lifetime of the generated token
	TokenMaxTTL *float64 `json:"tokenMaxTtl,omitempty" tf:"token_max_ttl,omitempty"`

	// If set, the default policy will not be set on
	// generated tokens; otherwise it will be added to the policies set in token_policies.
	// If true, the 'default' policy will not automatically be added to generated tokens
	TokenNoDefaultPolicy *bool `json:"tokenNoDefaultPolicy,omitempty" tf:"token_no_default_policy,omitempty"`

	// The maximum number
	// of times a generated token may be used (within its lifetime); 0 means unlimited.
	// The maximum number of times a token may be used, a value of zero means unlimited
	TokenNumUses *float64 `json:"tokenNumUses,omitempty" tf:"token_num_uses,omitempty"`

	// If set, indicates that the
	// token generated using this role should never expire. The token should be renewed within the
	// duration specified by this value. At each renewal, the token's TTL will be set to the
	// value of this field. Specified in seconds.
	// Generated Token's Period
	TokenPeriod *float64 `json:"tokenPeriod,omitempty" tf:"token_period,omitempty"`

	// List of policies to encode onto generated tokens. Depending
	// on the auth method, this list may be supplemented by user/group/other values.
	// Generated Token's Policies
	TokenPolicies []*string `json:"tokenPolicies,omitempty" tf:"token_policies,omitempty"`

	// The incremental lifetime for generated tokens in number of seconds.
	// Its current value will be referenced at renewal time.
	// The initial ttl of the token to generate in seconds
	TokenTTL *float64 `json:"tokenTtl,omitempty" tf:"token_ttl,omitempty"`

	// The type of token that should be generated. Can be service,
	// batch, or default to use the mount's tuned default (which unless changed will be
	// service tokens). For token store roles, there are two additional possibilities:
	// default-service and default-batch which specify the type to return unless the client
	// requests a different type at generation time.
	// The type of token to generate, service or batch
	TokenType *string `json:"tokenType,omitempty" tf:"token_type,omitempty"`
}

func (*AuthBackendRoleInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleInitParameters.

func (*AuthBackendRoleInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRoleList

type AuthBackendRoleList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []AuthBackendRole `json:"items"`
}

AuthBackendRoleList contains a list of AuthBackendRoles

func (*AuthBackendRoleList) DeepCopy

func (in *AuthBackendRoleList) DeepCopy() *AuthBackendRoleList

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleList.

func (*AuthBackendRoleList) DeepCopyInto

func (in *AuthBackendRoleList) DeepCopyInto(out *AuthBackendRoleList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*AuthBackendRoleList) DeepCopyObject

func (in *AuthBackendRoleList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*AuthBackendRoleList) GetItems

func (l *AuthBackendRoleList) GetItems() []resource.Managed

GetItems of this AuthBackendRoleList.

type AuthBackendRoleObservation

type AuthBackendRoleObservation struct {

	// The unique name of the auth backend to configure.
	// Defaults to approle.
	// Unique name of the auth backend to configure.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Whether or not to require secret_id to be
	// presented when logging in using this AppRole. Defaults to true.
	// Whether or not to require secret_id to be present when logging in using this AppRole.
	BindSecretID *bool `json:"bindSecretId,omitempty" tf:"bind_secret_id,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The RoleID of this role. If not specified, one will be
	// auto-generated.
	// The RoleID of the role. Autogenerated if not set.
	RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"`

	// The name of the role.
	// Name of the role.
	RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"`

	// If set,
	// specifies blocks of IP addresses which can perform the login operation.
	// List of CIDR blocks that can log in using the AppRole.
	SecretIDBoundCidrs []*string `json:"secretIdBoundCidrs,omitempty" tf:"secret_id_bound_cidrs,omitempty"`

	// The number of times any particular SecretID
	// can be used to fetch a token from this AppRole, after which the SecretID will
	// expire. A value of zero will allow unlimited uses.
	// Number of times which a particular SecretID can be used to fetch a token from this AppRole, after which the SecretID will expire. Leaving this unset or setting it to 0 will allow unlimited uses.
	SecretIDNumUses *float64 `json:"secretIdNumUses,omitempty" tf:"secret_id_num_uses,omitempty"`

	// The number of seconds after which any SecretID
	// expires.
	// Number of seconds a SecretID remains valid for.
	SecretIDTTL *float64 `json:"secretIdTtl,omitempty" tf:"secret_id_ttl,omitempty"`

	// List of CIDR blocks; if set, specifies blocks of IP
	// addresses which can authenticate successfully, and ties the resulting token to these blocks
	// as well.
	// Specifies the blocks of IP addresses which are allowed to use the generated token
	TokenBoundCidrs []*string `json:"tokenBoundCidrs,omitempty" tf:"token_bound_cidrs,omitempty"`

	// If set, will encode an
	// explicit max TTL
	// onto the token in number of seconds. This is a hard cap even if token_ttl and
	// token_max_ttl would otherwise allow a renewal.
	// Generated Token's Explicit Maximum TTL in seconds
	TokenExplicitMaxTTL *float64 `json:"tokenExplicitMaxTtl,omitempty" tf:"token_explicit_max_ttl,omitempty"`

	// The maximum lifetime for generated tokens in number of seconds.
	// Its current value will be referenced at renewal time.
	// The maximum lifetime of the generated token
	TokenMaxTTL *float64 `json:"tokenMaxTtl,omitempty" tf:"token_max_ttl,omitempty"`

	// If set, the default policy will not be set on
	// generated tokens; otherwise it will be added to the policies set in token_policies.
	// If true, the 'default' policy will not automatically be added to generated tokens
	TokenNoDefaultPolicy *bool `json:"tokenNoDefaultPolicy,omitempty" tf:"token_no_default_policy,omitempty"`

	// The maximum number
	// of times a generated token may be used (within its lifetime); 0 means unlimited.
	// The maximum number of times a token may be used, a value of zero means unlimited
	TokenNumUses *float64 `json:"tokenNumUses,omitempty" tf:"token_num_uses,omitempty"`

	// If set, indicates that the
	// token generated using this role should never expire. The token should be renewed within the
	// duration specified by this value. At each renewal, the token's TTL will be set to the
	// value of this field. Specified in seconds.
	// Generated Token's Period
	TokenPeriod *float64 `json:"tokenPeriod,omitempty" tf:"token_period,omitempty"`

	// List of policies to encode onto generated tokens. Depending
	// on the auth method, this list may be supplemented by user/group/other values.
	// Generated Token's Policies
	TokenPolicies []*string `json:"tokenPolicies,omitempty" tf:"token_policies,omitempty"`

	// The incremental lifetime for generated tokens in number of seconds.
	// Its current value will be referenced at renewal time.
	// The initial ttl of the token to generate in seconds
	TokenTTL *float64 `json:"tokenTtl,omitempty" tf:"token_ttl,omitempty"`

	// The type of token that should be generated. Can be service,
	// batch, or default to use the mount's tuned default (which unless changed will be
	// service tokens). For token store roles, there are two additional possibilities:
	// default-service and default-batch which specify the type to return unless the client
	// requests a different type at generation time.
	// The type of token to generate, service or batch
	TokenType *string `json:"tokenType,omitempty" tf:"token_type,omitempty"`
}

func (*AuthBackendRoleObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleObservation.

func (*AuthBackendRoleObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRoleParameters

type AuthBackendRoleParameters struct {

	// The unique name of the auth backend to configure.
	// Defaults to approle.
	// Unique name of the auth backend to configure.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Whether or not to require secret_id to be
	// presented when logging in using this AppRole. Defaults to true.
	// Whether or not to require secret_id to be present when logging in using this AppRole.
	// +kubebuilder:validation:Optional
	BindSecretID *bool `json:"bindSecretId,omitempty" tf:"bind_secret_id,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The RoleID of this role. If not specified, one will be
	// auto-generated.
	// The RoleID of the role. Autogenerated if not set.
	// +kubebuilder:validation:Optional
	RoleID *string `json:"roleId,omitempty" tf:"role_id,omitempty"`

	// The name of the role.
	// Name of the role.
	// +kubebuilder:validation:Optional
	RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"`

	// If set,
	// specifies blocks of IP addresses which can perform the login operation.
	// List of CIDR blocks that can log in using the AppRole.
	// +kubebuilder:validation:Optional
	SecretIDBoundCidrs []*string `json:"secretIdBoundCidrs,omitempty" tf:"secret_id_bound_cidrs,omitempty"`

	// The number of times any particular SecretID
	// can be used to fetch a token from this AppRole, after which the SecretID will
	// expire. A value of zero will allow unlimited uses.
	// Number of times which a particular SecretID can be used to fetch a token from this AppRole, after which the SecretID will expire. Leaving this unset or setting it to 0 will allow unlimited uses.
	// +kubebuilder:validation:Optional
	SecretIDNumUses *float64 `json:"secretIdNumUses,omitempty" tf:"secret_id_num_uses,omitempty"`

	// The number of seconds after which any SecretID
	// expires.
	// Number of seconds a SecretID remains valid for.
	// +kubebuilder:validation:Optional
	SecretIDTTL *float64 `json:"secretIdTtl,omitempty" tf:"secret_id_ttl,omitempty"`

	// List of CIDR blocks; if set, specifies blocks of IP
	// addresses which can authenticate successfully, and ties the resulting token to these blocks
	// as well.
	// Specifies the blocks of IP addresses which are allowed to use the generated token
	// +kubebuilder:validation:Optional
	TokenBoundCidrs []*string `json:"tokenBoundCidrs,omitempty" tf:"token_bound_cidrs,omitempty"`

	// If set, will encode an
	// explicit max TTL
	// onto the token in number of seconds. This is a hard cap even if token_ttl and
	// token_max_ttl would otherwise allow a renewal.
	// Generated Token's Explicit Maximum TTL in seconds
	// +kubebuilder:validation:Optional
	TokenExplicitMaxTTL *float64 `json:"tokenExplicitMaxTtl,omitempty" tf:"token_explicit_max_ttl,omitempty"`

	// The maximum lifetime for generated tokens in number of seconds.
	// Its current value will be referenced at renewal time.
	// The maximum lifetime of the generated token
	// +kubebuilder:validation:Optional
	TokenMaxTTL *float64 `json:"tokenMaxTtl,omitempty" tf:"token_max_ttl,omitempty"`

	// If set, the default policy will not be set on
	// generated tokens; otherwise it will be added to the policies set in token_policies.
	// If true, the 'default' policy will not automatically be added to generated tokens
	// +kubebuilder:validation:Optional
	TokenNoDefaultPolicy *bool `json:"tokenNoDefaultPolicy,omitempty" tf:"token_no_default_policy,omitempty"`

	// The maximum number
	// of times a generated token may be used (within its lifetime); 0 means unlimited.
	// The maximum number of times a token may be used, a value of zero means unlimited
	// +kubebuilder:validation:Optional
	TokenNumUses *float64 `json:"tokenNumUses,omitempty" tf:"token_num_uses,omitempty"`

	// If set, indicates that the
	// token generated using this role should never expire. The token should be renewed within the
	// duration specified by this value. At each renewal, the token's TTL will be set to the
	// value of this field. Specified in seconds.
	// Generated Token's Period
	// +kubebuilder:validation:Optional
	TokenPeriod *float64 `json:"tokenPeriod,omitempty" tf:"token_period,omitempty"`

	// List of policies to encode onto generated tokens. Depending
	// on the auth method, this list may be supplemented by user/group/other values.
	// Generated Token's Policies
	// +kubebuilder:validation:Optional
	TokenPolicies []*string `json:"tokenPolicies,omitempty" tf:"token_policies,omitempty"`

	// The incremental lifetime for generated tokens in number of seconds.
	// Its current value will be referenced at renewal time.
	// The initial ttl of the token to generate in seconds
	// +kubebuilder:validation:Optional
	TokenTTL *float64 `json:"tokenTtl,omitempty" tf:"token_ttl,omitempty"`

	// The type of token that should be generated. Can be service,
	// batch, or default to use the mount's tuned default (which unless changed will be
	// service tokens). For token store roles, there are two additional possibilities:
	// default-service and default-batch which specify the type to return unless the client
	// requests a different type at generation time.
	// The type of token to generate, service or batch
	// +kubebuilder:validation:Optional
	TokenType *string `json:"tokenType,omitempty" tf:"token_type,omitempty"`
}

func (*AuthBackendRoleParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleParameters.

func (*AuthBackendRoleParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRoleSecretID

type AuthBackendRoleSecretID struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.roleName) || has(self.initProvider.roleName)",message="roleName is a required parameter"
	Spec   AuthBackendRoleSecretIDSpec   `json:"spec"`
	Status AuthBackendRoleSecretIDStatus `json:"status,omitempty"`
}

AuthBackendRoleSecretID is the Schema for the AuthBackendRoleSecretIDs API. Manages AppRole auth backend role SecretIDs in Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*AuthBackendRoleSecretID) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) DeepCopyInto

func (in *AuthBackendRoleSecretID) DeepCopyInto(out *AuthBackendRoleSecretID)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*AuthBackendRoleSecretID) DeepCopyObject

func (in *AuthBackendRoleSecretID) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*AuthBackendRoleSecretID) GetCondition

GetCondition of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) GetConnectionDetailsMapping

func (tr *AuthBackendRoleSecretID) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this AuthBackendRoleSecretID

func (*AuthBackendRoleSecretID) GetDeletionPolicy

func (mg *AuthBackendRoleSecretID) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) GetID

func (tr *AuthBackendRoleSecretID) GetID() string

GetID returns ID of underlying Terraform resource of this AuthBackendRoleSecretID

func (*AuthBackendRoleSecretID) GetInitParameters added in v0.2.0

func (tr *AuthBackendRoleSecretID) GetInitParameters() (map[string]any, error)

GetInitParameters of this AuthBackendRoleSecretID

func (*AuthBackendRoleSecretID) GetManagementPolicies added in v0.2.0

func (mg *AuthBackendRoleSecretID) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) GetObservation

func (tr *AuthBackendRoleSecretID) GetObservation() (map[string]any, error)

GetObservation of this AuthBackendRoleSecretID

func (*AuthBackendRoleSecretID) GetParameters

func (tr *AuthBackendRoleSecretID) GetParameters() (map[string]any, error)

GetParameters of this AuthBackendRoleSecretID

func (*AuthBackendRoleSecretID) GetProviderConfigReference

func (mg *AuthBackendRoleSecretID) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) GetProviderReference

func (mg *AuthBackendRoleSecretID) GetProviderReference() *xpv1.Reference

GetProviderReference of this AuthBackendRoleSecretID. Deprecated: Use GetProviderConfigReference.

func (*AuthBackendRoleSecretID) GetPublishConnectionDetailsTo

func (mg *AuthBackendRoleSecretID) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) GetTerraformResourceType

func (mg *AuthBackendRoleSecretID) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this AuthBackendRoleSecretID

func (*AuthBackendRoleSecretID) GetTerraformSchemaVersion

func (tr *AuthBackendRoleSecretID) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*AuthBackendRoleSecretID) GetWriteConnectionSecretToReference

func (mg *AuthBackendRoleSecretID) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) LateInitialize

func (tr *AuthBackendRoleSecretID) LateInitialize(attrs []byte) (bool, error)

LateInitialize this AuthBackendRoleSecretID using its observed tfState. returns True if there are any spec changes for the resource.

func (*AuthBackendRoleSecretID) SetConditions

func (mg *AuthBackendRoleSecretID) SetConditions(c ...xpv1.Condition)

SetConditions of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) SetDeletionPolicy

func (mg *AuthBackendRoleSecretID) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) SetManagementPolicies added in v0.2.0

func (mg *AuthBackendRoleSecretID) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) SetObservation

func (tr *AuthBackendRoleSecretID) SetObservation(obs map[string]any) error

SetObservation for this AuthBackendRoleSecretID

func (*AuthBackendRoleSecretID) SetParameters

func (tr *AuthBackendRoleSecretID) SetParameters(params map[string]any) error

SetParameters for this AuthBackendRoleSecretID

func (*AuthBackendRoleSecretID) SetProviderConfigReference

func (mg *AuthBackendRoleSecretID) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) SetProviderReference

func (mg *AuthBackendRoleSecretID) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this AuthBackendRoleSecretID. Deprecated: Use SetProviderConfigReference.

func (*AuthBackendRoleSecretID) SetPublishConnectionDetailsTo

func (mg *AuthBackendRoleSecretID) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretID) SetWriteConnectionSecretToReference

func (mg *AuthBackendRoleSecretID) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this AuthBackendRoleSecretID.

type AuthBackendRoleSecretIDInitParameters added in v0.2.0

type AuthBackendRoleSecretIDInitParameters struct {

	// Unique name of the auth backend to configure.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// If set, specifies blocks of IP addresses which can
	// perform the login operation using this SecretID.
	// List of CIDR blocks that can log in using the SecretID.
	CidrList []*string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"`

	// A JSON-encoded string containing metadata in
	// key-value pairs to be set on tokens issued with this SecretID.
	// JSON-encoded secret data to write.
	Metadata *string `json:"metadata,omitempty" tf:"metadata,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The name of the role to create the SecretID for.
	// Name of the role.
	RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"`

	// Set to true to use the wrapped secret-id accessor as the resource ID.
	// If false (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
	// invalidated through unwrapping.
	// Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
	WithWrappedAccessor *bool `json:"withWrappedAccessor,omitempty" tf:"with_wrapped_accessor,omitempty"`

	// If set, the SecretID response will be
	// response-wrapped
	// and available for the duration specified. Only a single unwrapping of the
	// token is allowed.
	// The TTL duration of the wrapped SecretID.
	WrappingTTL *string `json:"wrappingTtl,omitempty" tf:"wrapping_ttl,omitempty"`
}

func (*AuthBackendRoleSecretIDInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDInitParameters.

func (*AuthBackendRoleSecretIDInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRoleSecretIDList

type AuthBackendRoleSecretIDList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []AuthBackendRoleSecretID `json:"items"`
}

AuthBackendRoleSecretIDList contains a list of AuthBackendRoleSecretIDs

func (*AuthBackendRoleSecretIDList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDList.

func (*AuthBackendRoleSecretIDList) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*AuthBackendRoleSecretIDList) DeepCopyObject

func (in *AuthBackendRoleSecretIDList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*AuthBackendRoleSecretIDList) GetItems

GetItems of this AuthBackendRoleSecretIDList.

type AuthBackendRoleSecretIDObservation

type AuthBackendRoleSecretIDObservation struct {

	// The unique ID for this SecretID that can be safely logged.
	// The unique ID used to access this SecretID.
	Accessor *string `json:"accessor,omitempty" tf:"accessor,omitempty"`

	// Unique name of the auth backend to configure.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// If set, specifies blocks of IP addresses which can
	// perform the login operation using this SecretID.
	// List of CIDR blocks that can log in using the SecretID.
	CidrList []*string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// A JSON-encoded string containing metadata in
	// key-value pairs to be set on tokens issued with this SecretID.
	// JSON-encoded secret data to write.
	Metadata *string `json:"metadata,omitempty" tf:"metadata,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The name of the role to create the SecretID for.
	// Name of the role.
	RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"`

	// Set to true to use the wrapped secret-id accessor as the resource ID.
	// If false (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
	// invalidated through unwrapping.
	// Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
	WithWrappedAccessor *bool `json:"withWrappedAccessor,omitempty" tf:"with_wrapped_accessor,omitempty"`

	// The unique ID for the response-wrapped SecretID that can
	// be safely logged.
	// The wrapped SecretID accessor.
	WrappingAccessor *string `json:"wrappingAccessor,omitempty" tf:"wrapping_accessor,omitempty"`

	// If set, the SecretID response will be
	// response-wrapped
	// and available for the duration specified. Only a single unwrapping of the
	// token is allowed.
	// The TTL duration of the wrapped SecretID.
	WrappingTTL *string `json:"wrappingTtl,omitempty" tf:"wrapping_ttl,omitempty"`
}

func (*AuthBackendRoleSecretIDObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDObservation.

func (*AuthBackendRoleSecretIDObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRoleSecretIDParameters

type AuthBackendRoleSecretIDParameters struct {

	// Unique name of the auth backend to configure.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// If set, specifies blocks of IP addresses which can
	// perform the login operation using this SecretID.
	// List of CIDR blocks that can log in using the SecretID.
	// +kubebuilder:validation:Optional
	CidrList []*string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"`

	// A JSON-encoded string containing metadata in
	// key-value pairs to be set on tokens issued with this SecretID.
	// JSON-encoded secret data to write.
	// +kubebuilder:validation:Optional
	Metadata *string `json:"metadata,omitempty" tf:"metadata,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The name of the role to create the SecretID for.
	// Name of the role.
	// +kubebuilder:validation:Optional
	RoleName *string `json:"roleName,omitempty" tf:"role_name,omitempty"`

	// The SecretID to be created. If set, uses "Push"
	// mode.  Defaults to Vault auto-generating SecretIDs.
	// The SecretID to be managed. If not specified, Vault auto-generates one.
	// +kubebuilder:validation:Optional
	SecretIDSecretRef *v1.SecretKeySelector `json:"secretIdSecretRef,omitempty" tf:"-"`

	// Set to true to use the wrapped secret-id accessor as the resource ID.
	// If false (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
	// invalidated through unwrapping.
	// Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping.
	// +kubebuilder:validation:Optional
	WithWrappedAccessor *bool `json:"withWrappedAccessor,omitempty" tf:"with_wrapped_accessor,omitempty"`

	// If set, the SecretID response will be
	// response-wrapped
	// and available for the duration specified. Only a single unwrapping of the
	// token is allowed.
	// The TTL duration of the wrapped SecretID.
	// +kubebuilder:validation:Optional
	WrappingTTL *string `json:"wrappingTtl,omitempty" tf:"wrapping_ttl,omitempty"`
}

func (*AuthBackendRoleSecretIDParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDParameters.

func (*AuthBackendRoleSecretIDParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRoleSecretIDSpec

type AuthBackendRoleSecretIDSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     AuthBackendRoleSecretIDParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider AuthBackendRoleSecretIDInitParameters `json:"initProvider,omitempty"`
}

AuthBackendRoleSecretIDSpec defines the desired state of AuthBackendRoleSecretID

func (*AuthBackendRoleSecretIDSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDSpec.

func (*AuthBackendRoleSecretIDSpec) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRoleSecretIDStatus

type AuthBackendRoleSecretIDStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        AuthBackendRoleSecretIDObservation `json:"atProvider,omitempty"`
}

AuthBackendRoleSecretIDStatus defines the observed state of AuthBackendRoleSecretID.

func (*AuthBackendRoleSecretIDStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSecretIDStatus.

func (*AuthBackendRoleSecretIDStatus) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRoleSpec

type AuthBackendRoleSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     AuthBackendRoleParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider AuthBackendRoleInitParameters `json:"initProvider,omitempty"`
}

AuthBackendRoleSpec defines the desired state of AuthBackendRole

func (*AuthBackendRoleSpec) DeepCopy

func (in *AuthBackendRoleSpec) DeepCopy() *AuthBackendRoleSpec

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleSpec.

func (*AuthBackendRoleSpec) DeepCopyInto

func (in *AuthBackendRoleSpec) DeepCopyInto(out *AuthBackendRoleSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AuthBackendRoleStatus

type AuthBackendRoleStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        AuthBackendRoleObservation `json:"atProvider,omitempty"`
}

AuthBackendRoleStatus defines the observed state of AuthBackendRole.

func (*AuthBackendRoleStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthBackendRoleStatus.

func (*AuthBackendRoleStatus) DeepCopyInto

func (in *AuthBackendRoleStatus) DeepCopyInto(out *AuthBackendRoleStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL